Search Results

Search results for "security"

A Dive Into The Security Aspect of Development

Conference
Security

Ahmed Rashwan


Advanced Authentication patterns at the Edge

Conference
Architecture

Denis Jannot

Solo.io

a gatekeeper named behavior analysis

Conference
Security

Rachid Zarouali

sevensphere

Apache Maven survival guide “Bring it on! -Mode” #no-external-tools #only-standard-plugins

Conference
Build & Deploy

Richard Fichtner

XDEV Software GmbH

Application security: What should the attack landscape look like in 2030?

Conference
Coding in 2030

Chris Swan

The @ Company

Bootstrapping a secure AWS environment? Terraform to the rescue!

Tools-in-Action
Security

David Melamed

Jit

Building your first malicious chrome extension 😈

Tools-in-Action
UI & UX

Alon Kiriati

Dropbox

Certificates and encryption; All you need to know… (But where afraid to ask)

Conference
Security

Pieter van der Meer

Dataworkz

Clean and Secure Infrastructure as Code

Conference
Build & Deploy

Mario-Leander Reimer

QAware GmbH

CTF: 101

Mini Lab
Security

Micah Silverman

Snyk

Kyle Suero

Snyk

CTF: 101

Mini Lab
Security

Kyle Suero

Snyk

Deserialization exploits in Java: why should I care?

Conference
Security

Brian Vermeer

Snyk

Document security and digital signatures in PDF

Conference
Security

Matthias Valvekens

iText

Don't Panic: Getting Your Infrastructure Drift Under Control

Conference
Build & Deploy

Eran Bibi

Firefly

Enabling DevOps and SecOps for over 22k applications

Conference
Build & Deploy

Paul Jackson

Capital One

Chris Richardson

Capital One

Experimenting with Deno for Easier Kubernetes Deployments

Conference
Programming Languages

Yshay Yaacobi

Livecycle

From Zero to Secure Software Supply Chain Ready with GoReleaser

Tools-in-Action
Build & Deploy

Engin Diri

Schwarz IT

Game Over or Game Changing? Why Software Development May Never be the same again

Birds of a Feather (BOF)
Build & Deploy

Steve Poole

Sonatype

High-Secure Java Serialization

Conference
Java

Markus Kett

MicroStream Software GmbH

How (not) to generate passwords

Conference
Security

Mathis Hammel

CodinGame

How to get Hacker Kids to Max Out your AWS account in 10 Hours, and Other Reasons to focus on your Secure Software Supply Chain

Conference
Build & Deploy

Kevin Rudland

Capgemini

Chris Burns

Capgemini

Improve Cloud Security Posture Management using Oracle Cloud Guard

Conference
Security

Nitin Bhagat

Oracle

Lessons Learned from Writing Thousands of Lines of IaC

Conference
Build & Deploy

Eran Bibi

Firefly

Levelling up secure development in a post-Log4Shell world

Keynote
Security

Simon Maple

Snyk

Log4J mini lab

Mini Lab
Security

Brian Vermeer

Snyk

Micah Silverman

Snyk

Log4Shell : Armageddon or Opportunity?

Conference
Security

Steve Poole

Sonatype

Minimize The Effect Of Your Next Data Breach By Strengthen Your Customer's Password

Conference
Security

Alon Kiriati

Dropbox

Minimum Viable Security for Cloud Native Apps

Conference
Security

David Melamed

Jit

New Detection Techniques Against ThisPersonDoesNotExist.com

Conference
Data & AI

Mathis Hammel

CodinGame

OAuth 2.1 - The Security Update

Conference
Security

Andreas Falk

Novatec Consulting

OAuth for New and Legacy Apps with Spring Cloud Gateway

Mini Lab
Security

Brian Demers

Okta

OAuth, OpenID Connect and SAML.. What is this all about?

Tools-in-Action
Security

Neha Sardana

Morgan Stanley

Protecting your organization against attacks via the build system

Conference
Security

Louis Jacomet

Gradle

Securing Quarkus applications

Conference
Security

Alex Soto

Red Hat

Security lessons from Mother Nature

Conference
Security

Grace Jansen

IBM

Security Risk: Single-Page Applications

Conference
Security

Andreas Falk

Novatec Consulting

Security Warning: Your Java Attack Surface Just Got Bigger

Conference
Security

Brian Vermeer

Snyk

Small Fix

Mini Lab
Security

Micah Silverman

Snyk

Small Fix

Mini Lab
Security

Micah Silverman

Snyk

Spring Cloud Gateway: Resilience, Security, and Observability

Conference
Java

Thomas Vitale

Systematic

Testcontainers & You: The Joy of OSS contribution

Mini Lab
Security

Kevin Wittek

AtomicJar, Inc.

The 7 Most Common Types of Cybersecurity Attacks in 2021

Byte Size
Security

Devlin Duldulao

inmeta

The Java Developer’s Guide to Encryption and Password Hashing

Conference
Security

Brian Vermeer

Snyk

The new Spring Security authorization server: A new hope!

Conference
Architecture

Laurentiu Spilca

Endava

The new Spring Security authorization server: A new hope!

Conference
Architecture

Laurentiu Spilca

Endava

Validating Configs from Code to Deployment in the GitOps World

Tools-in-Action
Development Practices

Noaa Barki

Datree

Vuln smack down

Mini Lab
Security

Micah Silverman

Snyk

What DevSecOps can learn from Elon Musk

Ignite
Mind the Geek

Joseph Bernie

Sonatype

What Happens to Encryption in a Quantum-Classical World? | Lets ask Alice, Bob and Eve

Conference
Coding in 2030

Danni Youziel

10x Banking

Why you shouldn't trust me

Conference
Security

Marzia Catherine Azam

IBM

Keerthana Ganesh

IBM